You are on page 1of 39

GLACY+

Global Action on Cybercrime Extended


Action globale sur la cybercriminalité elargie

African Union Commission – Council of Europe Joint Programme


”Cyber Security and Cybercrime Policies for African Diplomats”

Cyber security and Cybercrime


Background & Global outlook

Jan KERKHOFS
Council of Europe Expert
Federal Magistrate, Federal Prosecutor’s Office, Belgium

jan.Kerkhofs@just.fgov.be

Addis Ababa, Ethiopia, 11-12 April 2018

www.coe.int/cybercrime -1-
Cyber Security and cybercrime:
hand in hand

www.coe.int/cybercrime -2-
Cyber Security and cybercrime:
what is it?

Cyber Security Cybercrime


• Cyber security refers to • Criminal activities
the technologies and carried out by means of
processes designed to computers or the
protect computers, Internet (Oxford Dictionary)
networks and data from • Computer crime, ICT
unauthorized access, crime, high tech crime,
vulnerabilities and computer/ICT/high tech
attacks delivered via the enabled crime, …
Internet by (cyber)
criminals
www.coe.int/cybercrime -3-
Cyber security and Cybercrime

-4-
What is at stake? - Critical
infrastructures

www.coe.int/cybercrime -5-
A brief history

• 3500 BC: the abacus

• 1820: the first cybercrime!

• 1978: first spam-mail via Arpanet

• 1982: the first virus installed on an Apple

www.coe.int/cybercrime -6-
A brief history

• 1969 – ARPANET
– Militaire Advanced Research Projects Agency
(ARPA) – cold war
– Dynamic Rerouting
• The first step in cyberspace:
– “That's one small step for a man, one giant leap
for crime.“
• Build so it can not be blocked or seized

www.coe.int/cybercrime -7-
A brief history

ARPANET anno 1974

www.coe.int/cybercrime -8-
How the internet works:
dynamic rerouting

AZ

AZ

www.coe.int/cybercrime -9-
How the internet works:
dynamic rerouting

AZ -> A en Z

A en Z ->AZ

www.coe.int/cybercrime - 10 -
Information Society

• A part of the daily life of the citizens


• workplace,
• home
• most of the leisure moments

• There is no physical distances between people in


different places in the world

• Political frontiers are indifferent to the cyber world

http://blog.oxforddictionaries.com/2015/03/cyborgs-cyberspace-csi-cyber/,
www.coe.int/cybercrime 27/11/2016 - 12 -
Information Society

• Information is open and available to everybody

• No States sovereignty

• Cyberspace is independent, anarchic and


ungovernable

• It is everywhere and it is nowhere

• Any person can express himself

http://blog.oxforddictionaries.com/2015/03/cyborgs-cyberspace-csi-cyber/,
www.coe.int/cybercrime 27/11/2016 - 13 -
Internet of things (IoT)

www.coe.int/cybercrime - 14 -
Internet Users

11 April 2018, 5:04 pm


• Around 40% of the world
population has an internet
connection today. In 1995, it
was less than 1%.

• The number of
Internet users
has increased
tenfold from
1999 to 2013.

• The first billion


was reached in
2005. The
second billion
in 2010. The
third billion in
2014.
http://www.internetlivestats.com/internet-users/,
www.coe.int/cybercrime 27/11/2016 - 15
-
Global digital snapshot

https://www.slideshare.net/wearesocialsg/global-digital-statshot-q3-2017 - 16
-
Annual growth

https://www.slideshare.net/wearesocialsg/digital-in-2017-global-overview - 17 -
Quarterly growth

https://www.slideshare.net/wearesocialsg/global-digital-statshot-q3-2017 - 18 -
Internet Use: Regional overview

https://www.slideshare.net/wearesocialsg/digital-in-2017-global-overview - 19 -
Time spent on the Internet

https://www.slideshare.net/wearesocialsg/digital-in-2017-global-overview - 20 -
Social Media use

https://www.slideshare.net/wearesocialsg/global-digital-statshot-q3-2017 - 21 -
Social Media regional overview

https://www.slideshare.net/wearesocialsg/digital-in-2017-global-overview - 22 -
Active Users by Platform

https://www.slideshare.net/wearesocialsg/global-digital-statshot-q3-2017 - 23 -
Time spent on Social Media

https://www.slideshare.net/wearesocialsg/digital-in-2017-global-overview - 24 -
The regional African situation

https://www.slideshare.net/wearesocialsg/digital-in-2017-northern-africa - 25 -
Information Society and Cybercrime

• New illegal activities are being “invented” everyday


• within the networks
• using the networks
• against the networks
• A global crime
• Always multiple territorial connections
• the action of the criminals reach computers and victims in
countries other than their countries
• inherent to the nature of cybercrime
• because of the expansion of the networks it is impossible, to
each country, to act alone against this problem

www.coe.int/cybercrime - 26 -
Information Society and Cybercrime

• Crimes are committed remotely


• Evidence is volatile and often on the “cloud”
• National law enforcement agencies are limited to their
geographical borders
• International assistance in criminal investigations require
proper legal channels
• No jurisdiction online, if outside national borders
• International cooperation deals with very distant countries
with different cultures, with different legal tradition and
different criminal law frameworks

www.coe.int/cybercrime - 27 -
How criminals use Technology

TECHNOLOGY AS A Traditionally considered to be true “computer crime” and involves


VICTIM such offences as hacking, denial of service attacks and the
distribution of viruses.
TECHNOLOGY AS Computers and other devices are used to assist in the commission
AN AID TO CRIME of traditional crimes, for example, to produce forged documents,
to send death threats or blackmail demands or to create and
distribute illegal material such as images of child abuse.
TECHNOLOGY AS A Criminals use technology to communicate with each other in ways
COMMUNICATION which reduce the chances of detection, for example by the use of
TOOL encryption technology

TECHNOLOGY AS A Intentional or unintentional storage of information on devices used


STORAGE DEVICE in any of the other categories and typically involves the data held
on computer systems of victims, witnesses or suspects
TECHNOLOGY AS A Evidence contained in IT devices can be used to support evidence
WITNESS TO to which it is not obviously related, for example to prove or
CRIME disprove an alibi given by a suspect or a claim made by a witness.

www.coe.int/cybercrime - 28 -
Europol IOCTA – key findings
RANSOMWARE - MALWARE
ONLINE CHILD SEXUAL EXPLOITATION
PAYMENT FRAUD
SOCIAL ENGINEERING
Organised Crime

Assessment
DATA BREACHES AND NETWORK ATTACKS -
EUROPOL
Internet

Threat

DDOS
ATTACKS ON CRITICAL INFRASTRUCTURES
- DDOS

CRIMINAL ACTIVITIES ONLINE – ONLINE


CRIMINAL MARKETS
BIG DATA, IOT AND THE CLOUD
TERRORISM
Europol IOCTA Report 2017 - 29 -
A few examples: cybercrime and -
threats today

www.coe.int/cybercrime - 30 -
dinsdag 17 april 2018 Slim omgaan met het internet 31
32
How to make money
on the internet

Information via Social Malware


Phishing Engineer user

Sell the Malware


Data seller
information creator

www.coe.int/cybercrime - 33 -
dinsdag 17 april 2018 Slim omgaan met het internet 34
Phishing – social engeneering

www.coe.int/cybercrime - 35 -
The cybercrime threat map

https://www.europol.europa.eu/iocta/2017/index.html - 36 -
Succes factors

• Cyber security policy – Cybercrime legislation –


legal framework
• CERT – Cyber Emergency Plan
• Malabo Convention, 2014
• Budapest Convention, 2001

• Capacity building
• Skill and competence development

• Research and development


• International cooperation

www.coe.int/cybercrime - 37 -
Questions?

www.coe.int/cybercrime - 38 -
GLACY+
Global Action on Cybercrime Extended
Action globale sur la cybercriminalité elargie

Thank you

Jan KERKHOFS
Council of Europe Expert
Federal Magistrate, Federal Prosecutor’s Office, Belgium

jan.Kerkhofs@just.fgov.be

Addis Ababa, 11-12 April 2018

www.coe.int/cybercrime - 39 -

You might also like